Path Traversal Vulnerability in TeamCity Allows Limited Admin Actions
CVE-2024-27199
Summary
JetBrains TeamCity versions prior to 2023.11.4 are susceptible to a path traversal vulnerability that enables unauthorized users to execute limited administrative actions. This flaw could potentially allow attackers to exploit the system's structure, leading to the execution of unintended commands and unauthorized access. The implication of this vulnerability highlights the importance of updating to the latest version to safeguard against unauthorized access and maintain system integrity. Remote exploitation may allow attackers to navigate beyond restricted directories, posing risks to sensitive data and configurations.
Affected Version(s)
TeamCity 0 < 2023.11.4
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
JetBrains patches new TeamCity authentication bypass bugs
TeamCity servers risk being exposed to “complete compromise” if patch isn’t installed, researchers warned.
PravinKarthik
Read all of the posts by PravinKarthik on TheCyberThrone
TeamCity Vulnerability Exploits Lead to Jasmin Ransomware, Other Malware Types
CVE-2024-27198 and CVE-2024-27199 are vulnerabilities within the TeamCity On-Premises platform that can allow attackers to gain administrative control over affected systems.
References
CVSS V3.1
Timeline
- 📰
First article discovered by Help Net Security
Vulnerability published
Vulnerability Reserved